Katy, TX 77493
John Smith C|EH 123-456-7890
johnsmith@[Link]
Network Security and Python Software Engineer
A determined leader, backend engineer and Certified
Ethical Hacker; a passion for problem solving,
application development, network security, Linux, KNOWLEDGE & SKILLS
Python ⚬ ELK Stack ⚬ Automation ⚬
learning, data analytics, and automating tasks with
Suricata ⚬ Agile ⚬ Scrum ⚬
Python.
Application Security ⚬ Ethical
CYBERSECURITY RESEARCH AND PROJECTS Hacking ⚬ Traffic Analysis ⚬ Network
Detection And Response ⚬
Cybersecurity Projects:
Automating Technical Report Writing
[Link]
⚬ Incident Response ⚬ Forensic Drive
GitHub: [Link] Analysis ⚬ Server Administration ⚬
Linkedin: [Link] AWS ⚬ Beacon Analysis ⚬ Virtualbox
⚬ CA Deployment ⚬ Centralized
EXPERIENCE Cloud Management ⚬ Git ⚬ Bash
⚬ CI/CD
Cybersecurity Self Study: Katy, TX — BowTiedCyber LLC
May 2023 - Present
• Python scripting for creating tools, automation of testing processes for
running network scans, creating listeners from scratch with the sockets CERTIFICATIONS
and requests python libraries, result exportation and data conditioning. COMPTIA NETWORK+
• Implementation of a Network Proxy to capture, evaluate, manipulate, February 2023
and resend application traffic, as well as brute forcing login attempts,
dictionary attacks, cookie manipulation, encoding/decoding, function COMPTIA SECURITY+
discovery, web parameter tampering, cross site scripting and SQL March 2023
injection.
• Application of a Network Sniffer for the purpose of capturing network AZURE 900
traffic to follow, recompose conversations and filter by protocol, port April 2023
numbers, IP addresses or other network traffic characteristics.
• Utilization of wireless capturing suites for the purposes of capturing SPLUNK CORE USER
handshakes (WPA, WPA2), IVs (WEP), and creating MITM attacks, Evil April 2023
Twin attacks, DOS attacks and MAC address spoofing.
• Use of exploitation frameworks to search and designate vulnerabilities
in systems based on operating systems, version numbers, open ports,
traffic filtering, etc. EDUCATION
• Malware analysis on live machines, including first and second stage University of Texas at Katy,
viruses, ransomware, droppers, and Trojan Horses, for the purpose of
Katy, TX: 2019-2021 —
creating rules that indicate this infection on the network.
• Incident response and forensic drive analysis. Master's degree in Cybersecurity
with Honours
Plumber: Small Town, KS — Internship inc. University of Texas at Katy,
December 2018 - Present Katy, TX: 2016-2018 —
• Spearheaded a team of 5 plumbers in large-scale residential and Bachelor’s degree in
commercial projects, implementing agile methodologies to ensure
on-time, under-budget delivery, and high client satisfaction rates. Mathematics with Honours
• Demonstrated strong leadership in crisis management by quickly
BowTiedCyber Zero to Hoodie
diagnosing and resolving complex plumbing issues, reducing downtime
for businesses and leading to 95% customer retention rate. Cybersecurity Bootcamp,
• Utilized advanced project management software to track team Florida, 2023 — Cybersecurity
productivity, allocate resources, and prioritize tasks, transferring skills
highly applicable to tech environments. Course